A cryptographic method that requires two paired keys – one private and one public – is known as _______.
- Asymmetric Key
- Encryption
- Hashing
- Symmetric Key
An Asymmetric Key (or Public Key) cryptographic method uses two keys, one public and one private, for secure communication. Data encrypted with one key can only be decrypted with the other, providing a high level of security.
Loading...
Related Quiz
- When an attacker introduces malicious code into a software system, causing it to behave in unintended ways, this is known as what?
- Which VPN protocol operates at Layer 2 of the OSI model and is often used for remote access?
- An organization has detected an ongoing cyber attack. They've isolated the affected systems and are now focused on removing the threat and securing the systems to prevent the same attack in the future. Which phase of incident response are they currently in?
- In the context of access control, the decision to grant or deny a user's request is referred to as _______.
- A company's incident reporting procedure mandates the use of a specific platform for logging incidents to ensure traceability and accountability. This is an example of what kind of control?